httpd-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From (Sean Conner)
Subject Re: [users@httpd] Security scanners.
Date Thu, 27 Apr 2006 17:24:42 GMT
It was thus said that the Great Georgy Goshin once stated:
> Hello,
> A few of virtual hosts on my server was hacked - the content was replaced 
> and I can't figure how they did it. Is there any software that will scan the 
> web server and checks for known security holes?

  I don't know of any software [2] that will do what you ask, but having been
the recipient of several hacks [1] your server may not have been compromised
through the webserver---*any* other service running could have been the
vector through which you were compromised (DNS, SQL, SMTP, etc.).  Or it
could have been an inside job (the login information to update one of your
sites was compromised).

  Until you figure out how they got in, you have two choices:

	1. Turn off any services you don't need (you should do this anyway),
	   change all passwords and disable all CGI scripts until they've
	   been vetted clean.

	2. Nuke and pave.  Reinstall the server from scratch (I only
	   recommend this if you have no clue how to proceed or are truely
	   paranoid) with the latest version you have on CD, then patch
	   patch patch until *all* the software is to the latest version. 
	   You'll still want to turn off any services you don't need (or
	   understand) after the install, change the passwords and disable
	   any CGI scripts until they've been vetted.

  -spc (Been there, done that, don't even have a lousy tee shirt ... )

[1]	The worst so far being this one:

	There have been others though:

[2]	Actually, I do know of some, but they're the software programs that
	are currently trying to break in through an insecure webserver or
	CGI scripts.  You can check your web logfiles and see plenty of
	those happening.  If any of those requests are 200, then there's a

The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:> for more info.
To unsubscribe, e-mail:
   "   from the digest:
For additional commands, e-mail:

View raw message